Introducing G2.ai, the future of software buying.Try now

Top Free Malware Analysis Tools

Check out our list of free Malware Analysis Tools. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Malware Analysis Tools to ensure you get the right product.

View Free Malware Analysis Tools

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
12 Malware Analysis Tools Products Available
(913)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Malware Analysis Tools software
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 46% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.5
    Malware Evaluation
    Average: 9.0
    9.5
    Malware Detection
    Average: 9.1
    9.5
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JO
    ESET PROTECT lets me manage all our endpoints without needing to leave my desk. It quietly does its job scanning, updating and blocking threats, so... Read review
    TL
    This software is easy to use because it has a user-friendly interface. Users have control over the features, which are easy to handle for device... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    277,575 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,944 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 46% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.5
Malware Evaluation
Average: 9.0
9.5
Malware Detection
Average: 9.1
9.5
File Analysis
Average: 9.0
JO
ESET PROTECT lets me manage all our endpoints without needing to leave my desk. It quietly does its job scanning, updating and blocking threats, so... Read review
TL
This software is easy to use because it has a user-friendly interface. Users have control over the features, which are easy to handle for device... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
277,575 Twitter followers
LinkedIn® Page
www.linkedin.com
1,944 employees on LinkedIn®
(179)4.7 out of 5
3rd Easiest To Use in Malware Analysis Tools software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ANY.RUN's Interactive Sandbox is a cloud-based service for in-depth malware analysis. It offers visibility into threat behavior based on interactivity that allows you to detonate threats, fine-tune an

    Users
    • Security Analyst
    • Information Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 32% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ANY.RUN Sandbox features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 9.0
    9.1
    Malware Detection
    Average: 9.1
    9.2
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • LL
    Being able to observe malware behaviour in real time — file system changes, registry edits, network connections, process trees, and command... Read review
    AA
    I love how ANY.RUN Sandbox provides a detailed breakdown of information during the sandboxing of an Indicator of Compromise (IoC), which includes... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ANY.RUN
    Company Website
    Year Founded
    2016
    HQ Location
    Dubai, United Arab Emirates
    Twitter
    @anyrun_app
    31,259 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ANY.RUN's Interactive Sandbox is a cloud-based service for in-depth malware analysis. It offers visibility into threat behavior based on interactivity that allows you to detonate threats, fine-tune an

Users
  • Security Analyst
  • Information Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 32% Enterprise
  • 31% Mid-Market
ANY.RUN Sandbox features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 9.0
9.1
Malware Detection
Average: 9.1
9.2
File Analysis
Average: 9.0
LL
Being able to observe malware behaviour in real time — file system changes, registry edits, network connections, process trees, and command... Read review
AA
I love how ANY.RUN Sandbox provides a detailed breakdown of information during the sandboxing of an Indicator of Compromise (IoC), which includes... Read review
Seller Details
Seller
ANY.RUN
Company Website
Year Founded
2016
HQ Location
Dubai, United Arab Emirates
Twitter
@anyrun_app
31,259 Twitter followers
LinkedIn® Page
www.linkedin.com
331 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(217)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Malware Analysis Tools software
Save to My Lists
Entry Level Price:Starting at $9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 58% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
    • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
    • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 9.0
    9.6
    Malware Detection
    Average: 9.1
    9.4
    File Analysis
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    324 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 58% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
  • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
  • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 9.0
9.6
Malware Detection
Average: 9.1
9.4
File Analysis
Average: 9.0
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,914 Twitter followers
LinkedIn® Page
www.linkedin.com
324 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threat.Zone is a a holistic malware platform that is hypervisor-based, automated and interactive tool for analyzing malware, so you can fight new generation malwares by conducting: Real-time behaviora

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threat Zone features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Malware Evaluation
    Average: 9.0
    9.0
    Malware Detection
    Average: 9.1
    9.2
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rahul J.
    RJ
    I liked the simple user interface and ease with which I could get things started on the website. The static and dynamic options are beneficial and... Read review
    Daniel E.
    DE
    I like that threat zone has a free plan to help people decide whether or not it is good an theyd like to use it Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Malwation
    Year Founded
    2020
    HQ Location
    Delaware, US
    Twitter
    @malwation
    1,046 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threat.Zone is a a holistic malware platform that is hypervisor-based, automated and interactive tool for analyzing malware, so you can fight new generation malwares by conducting: Real-time behaviora

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 35% Enterprise
Threat Zone features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.8
9.0
Malware Evaluation
Average: 9.0
9.0
Malware Detection
Average: 9.1
9.2
File Analysis
Average: 9.0
Rahul J.
RJ
I liked the simple user interface and ease with which I could get things started on the website. The static and dynamic options are beneficial and... Read review
Daniel E.
DE
I like that threat zone has a free plan to help people decide whether or not it is good an theyd like to use it Read review
Seller Details
Seller
Malwation
Year Founded
2020
HQ Location
Delaware, US
Twitter
@malwation
1,046 Twitter followers
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 90% Small-Business
    • 10% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    10.0
    Malware Detection
    Average: 9.1
    10.0
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Levan K.
    LK
    It is really easy to configure, user-friendly environment, easy to setup users and global policies, very easy to manage and for users to see if... Read review
    Sudeep J.
    SJ
    Considering the increased security threats these days specially in terms of malware sent as attachments in various formats it is imperative to have... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    odix
    Year Founded
    2012
    HQ Location
    Rosh Haain, Israel
    Twitter
    @odix
    7 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 90% Small-Business
  • 10% Mid-Market
FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
10.0
Malware Detection
Average: 9.1
10.0
File Analysis
Average: 9.0
Levan K.
LK
It is really easy to configure, user-friendly environment, easy to setup users and global policies, very easy to manage and for users to see if... Read review
Sudeep J.
SJ
Considering the increased security threats these days specially in terms of malware sent as attachments in various formats it is imperative to have... Read review
Seller Details
Seller
odix
Year Founded
2012
HQ Location
Rosh Haain, Israel
Twitter
@odix
7 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 88% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReversingLabs features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 9.0
    8.8
    Malware Detection
    Average: 9.1
    8.7
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Guercy Miguel  D.
    GD
    I appreciate the real-world scenarios and hands-on challenges that sharpen my reverse engineering and malware analysis skills. Read review
    Verified User in Financial Services
    UF
    It's really easy to use and help me to maintain save my pc. I used to use it a lot every day, and I fell constable using it. It was easy to... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Cambridge, US
    Twitter
    @ReversingLabs
    6,937 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    328 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

Users
No information available
Industries
No information available
Market Segment
  • 88% Small-Business
ReversingLabs features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 9.0
8.8
Malware Detection
Average: 9.1
8.7
File Analysis
Average: 9.0
Guercy Miguel  D.
GD
I appreciate the real-world scenarios and hands-on challenges that sharpen my reverse engineering and malware analysis skills. Read review
Verified User in Financial Services
UF
It's really easy to use and help me to maintain save my pc. I used to use it a lot every day, and I fell constable using it. It was easy to... Read review
Seller Details
Year Founded
2009
HQ Location
Cambridge, US
Twitter
@ReversingLabs
6,937 Twitter followers
LinkedIn® Page
www.linkedin.com
328 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todays zero-day threats, polymorphic malware and weaponized attachments demand a sophisticated multi-layered approach to keep businesses safe. VIPRE Email Security and suite of add-on solutions, del

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    Market Segment
    • 49% Mid-Market
    • 44% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Integrated Email Security features and usability ratings that predict user satisfaction
    7.6
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Malware Evaluation
    Average: 9.0
    8.3
    Malware Detection
    Average: 9.1
    8.3
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Automotive
    AA
    Removes the headache of having to manage on-prem spam filter. Read review
    RW
    You can call support and get a real person. Whether or not they know what they are talking about that is the question! It's a mixed bag as always. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,335 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    225 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todays zero-day threats, polymorphic malware and weaponized attachments demand a sophisticated multi-layered approach to keep businesses safe. VIPRE Email Security and suite of add-on solutions, del

Users
  • IT Manager
Industries
  • Information Technology and Services
Market Segment
  • 49% Mid-Market
  • 44% Small-Business
VIPRE Integrated Email Security features and usability ratings that predict user satisfaction
7.6
Has the product been a good partner in doing business?
Average: 8.8
10.0
Malware Evaluation
Average: 9.0
8.3
Malware Detection
Average: 9.1
8.3
File Analysis
Average: 9.0
Verified User in Automotive
AA
Removes the headache of having to manage on-prem spam filter. Read review
RW
You can call support and get a real person. Whether or not they know what they are talking about that is the question! It's a mixed bag as always. Read review
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,335 Twitter followers
LinkedIn® Page
www.linkedin.com
225 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Enterprise
    • 14% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VMRay features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.7
    Malware Evaluation
    Average: 9.0
    9.0
    Malware Detection
    Average: 9.1
    8.7
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    Safe and secure sandbox with multiple ways to submit. Read review
    Verified User in Pharmaceuticals
    AP
    The VMRay platform is robust and capable at detecting a variety of threats, and is certainly a leader in malware sandbox tech. Their customer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VMRay
    Company Website
    Year Founded
    2013
    HQ Location
    Bochum, DE
    Twitter
    @vmray
    4,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

Users
No information available
Industries
No information available
Market Segment
  • 86% Enterprise
  • 14% Small-Business
VMRay features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
8.7
Malware Evaluation
Average: 9.0
9.0
Malware Detection
Average: 9.1
8.7
File Analysis
Average: 9.0
Verified User in Financial Services
UF
Safe and secure sandbox with multiple ways to submit. Read review
Verified User in Pharmaceuticals
AP
The VMRay platform is robust and capable at detecting a variety of threats, and is certainly a leader in malware sandbox tech. Their customer... Read review
Seller Details
Seller
VMRay
Company Website
Year Founded
2013
HQ Location
Bochum, DE
Twitter
@vmray
4,032 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

    Users
    No information available
    Industries
    • Information Technology and Services
    • Internet
    Market Segment
    • 88% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BitNinja features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Malware Evaluation
    Average: 9.0
    8.3
    Malware Detection
    Average: 9.1
    8.3
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Alessandro C.
    AC
    It require almost no modification in your current software and infrastructure, very little impact on performance during normal operation Read review
    OM
    Firewalls are a primary line of defense for networked environments. With multiple modules Bitninja offers the best defense currently on the market.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Debrecen
    Twitter
    @bitninjaio
    1,091 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

Users
No information available
Industries
  • Information Technology and Services
  • Internet
Market Segment
  • 88% Small-Business
  • 8% Mid-Market
BitNinja features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
6.7
Malware Evaluation
Average: 9.0
8.3
Malware Detection
Average: 9.1
8.3
File Analysis
Average: 9.0
Alessandro C.
AC
It require almost no modification in your current software and infrastructure, very little impact on performance during normal operation Read review
OM
Firewalls are a primary line of defense for networked environments. With multiple modules Bitninja offers the best defense currently on the market.... Read review
Seller Details
Year Founded
2014
HQ Location
Debrecen
Twitter
@bitninjaio
1,091 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Adam B.
    AB
    The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Salt Lake City, US
    Twitter
    @alphamountainai
    49 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Adam B.
AB
The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
Seller Details
Year Founded
2020
HQ Location
Salt Lake City, US
Twitter
@alphamountainai
49 Twitter followers
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DOCGUARD Groundbreaking Malware Analysis Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Wilmington, US
    Twitter
    @doc_guard
    6,335 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DOCGUARD Groundbreaking Malware Analysis Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Wilmington, US
Twitter
@doc_guard
6,335 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,335 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    225 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,335 Twitter followers
LinkedIn® Page
www.linkedin.com
225 employees on LinkedIn®